Advanced Operating Systems
Students will have the ability to recognize security threats, computer system weaknesses and will be able to propose appropriate system protection procedures and techniques. Students will develop theoretical and practical knowledge about cryptography, fundamentals of computer security, operating system security mechanisms and secure systems design principles. Students will be able to use cryptography algorithms and apply protocols for key exchange, authentication and authorisation. Furthermore, students will be able to apply an instance of RAID system for increasing data availability and reliability.
- apply intraprocessor communication mechanisms
- modify mutual exclusion protocols in real distributed systems
- illustrate authentication protocols and key exchange protocols
- assemble hash functions, symmetric and asymmetric algorithms into complex cryptosystems
- calculate mean time to data loss
- design computer system with redundant array of independent disks (RAID)
Forms of Teaching
Teaching is organized into two teaching cycles (15-week classes, 3 hours per week). First cycle consists of 7-week classes and midterm exam. Second cycle consists of 6-week classes and final exam.Exams
Short tests. Midterm exam. Final exam.Laboratory Work
Two laboratory exercises.Consultations
|Type||Threshold||Percent of Grade||Threshold||Percent of Grade|
|Laboratory Exercises||0 %||10 %||0 %||0 %|
|Quizzes||0 %||10 %||0 %||0 %|
|Mid Term Exam: Written||0 %||30 %||0 %|
|Final Exam: Written||0 %||50 %|
|Exam: Written||0 %||50 %|
|Exam: Oral||50 %|
Week by Week Schedule
- Intraprocessor communication. File sharing. Sharing memory.
- Message queues. Pipelines.
- Mutual exclusion in distributed systems. Lamport's distributed mutual exclusion protocol. Ricart-Agrawala protocol.
- Security mechanisms. Threats and attacks. Security demands.
- Symmetric cryptosystems. Advanced Encryption Standard (AES). Block cipher modes of operation (ECB, CBC, CFB, OFB, CTR).
- Asymmetric cryptosystems (RSA, digital envelope). RSA cryptosystem analysis.
- Hash functions (SHA). Digital signature. Sealed digital envelope.
- Midterm exam
- Key management and key exchange protocols. Diffie-Hellman key exchange protocol. Authentication protocols.
- Access control and authorisation. Authentication Protocol Kerberos. Digital certificate. Public key infrastructure. X.509 certificate and authentication protocols.
- Array of disks. Striped disk array: byte-level and block-level striping.
- Failure rate models. System components reliability and availability, fault tolerance.
- Two-component and multi-component system modelling.
- Redundant disk array organisation. Mean time to data loss for various redundant disk arrays.
- Final exam